•
Validation of Polymorphic Object on page 531
•
Supported Polymorphic Object Categories on page 531
Access Control of Polymorphic Object
Table 48 on page 531 defines accessibility of polymorphic objects in different servers.
Table 48: Polymorphic Objects
Polymorphic
objects created
and used in a
regional server
Polymorphic objects
created in a Central
Manager, but used in
a regional server
Polymorphic objects
created and used in
Central Manager
Server
Yes
No
Yes
Create
Yes
Yes
No
Customize mapping table
Yes
No
Yes
Change name/color and
other attributes
Yes
Yes if not referenced
by central rules.
Yes
Delete
Validation of Polymorphic Object
When an administrator first creates a polymorphic object, the customization state is set
to pending. The validation routine generates a warning/error message when encountering
the pending state. Validation of a polymorphic object is triggered if an object is used by
a rule and that rule is edited or viewed in the policy manager.
Supported Polymorphic Object Categories
Polymorphic objects are in the same category as concrete objects of the same nature.
The shared object type attribute includes a new value for polymorphic objects of a specific
category. The following objects categories can have polymorphic type: Address, Service,
Zone, Global NAT and Routing Instance.
Zone is a polymorphic shared object at the Central Manager level. After a global pre/post
rule is pushed, zone objects resolve into names in prerules and postrules. A vsys zone
can only be supported with a polymorphic zone. Administrators must map every vsys
manually with a vsys zone name.
Global MIP/DIP/VIP objects in current NSM are intrinsically polymorphic. For all other
categories of shared objects at Central Manager level, only concrete shared objects are
supported.
Manage Polymorphic Objects
You can create polymorphic objects at the Central Manager level or the regional server
level. When polymorphic objects are created in the Central Manager they are pushed to
one or more regional servers where they are available to be populated with real values.
The workflow for using polymorphic objects is:
531
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...